Monday, May 05, 2014

iPhone 6 rumor rollup for the week ending May 2

Network World After Dark - Newsletter - networkworld.com
  25 geeky Mother's Day gifts | No reasonable expectation of privacy when third parties cross the creepy line?

 
  Network World After Dark

Forward this to a Friend >>>


iPhone 6 rumor rollup for the week ending May 2
Checks and guesses spurred rumors that Apple has begun shipping raw synthetic sapphire material to Asia for processing into iPhone 6 display covers. One analyst estimated the amount shipped would be good for….maybe 115,000 covers. Read More
 


RESOURCE COMPLIMENTS OF: Huawei Enterprise USA

Discover Huawei & Switch Your Switch
Huawei will match your current buy price plus give you an instant rebate of up to $2000 per switch. Click here for more info

WHITE PAPER: Network Instruments

Picking the Right Application Monitoring Solution
Successful application monitoring requires views of all facets related to service delivery and choosing the right APM solution can be a challenge. With this helpful IT Brief, you'll learn the 10 key components of a comprehensive APM solution so that you are able to make a better and more informed choice. Learn More

25 geeky Mother's Day gifts
Find a Mother's Day gift with a techie vibe Read More
 

No reasonable expectation of privacy when third parties cross the creepy line?
There's a "creepy line" when tech conveniences and capabilities seem to push too far into privacy rights; yet not everyone can be trusted to decide whether or not new technology used by the government crosses the "creepy line" and if Fourth Amendment protections should kick in. That includes SCOTUS, according to a former DHS official, who reduced the Supreme Court Justices to "nine Baby... Read More
 

Why is a former NFL cheerleader making Google and Facebook nervous?
What's so bad about one former cheerleader that Facebook, Google, Microsoft, Twitter, Amazon, Gawker and BuzzFeed are all teaming up legally against her? She may finally make Websites liable for their content. Sarah Jones sued a Website called The Dirty in 2012 after it posted her name and a photo, along with a supposed sexual history of both Jones and her ex-husband. Visitors to the site then piled... Read More
 

WWDC 2014: Don't expect an iWatch or the long-rumored Apple TV
With WWDC just under a month away, the rumor mill is about to go into full throttle. But before you get too excited, you should be aware that Apple will likely not introduce any game-changing hardware, or any hardware at all for that matter, at this year's developer conference. While Apple has historically used WWDC to announce new iPhones, Apple's annual developer conference has gotten back to its... Read More
 

Plain old paper inspires foldable smartphone prototype
  Never mind all those curvy smartphones and devices that have grabbed headlines and sparked rumors in recent months: Queen's University researchers last week showed off a prototype of a smartphone called PaperFold that morphs into all sorts of shapes. Read More
 

Resume Makeover: How to Sell Your Tech Sales Skills
In this month's CIO.com Resume Makeover, the devil's in the details as career and resume expert Ross Macpherson takes a technology sales professional's resume from confusing to concise Read More
 

11 reasons encryption is (almost) dead
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever Read More
 

Unisys unveils invisibility cloak for network traffic
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount. Read More
 

IBM: Security threat prevention isn't 'dead' yet!
There's been much discussion in the security industry that preventing malware-based infiltrations into the enterprise is nigh on impossible, and the new security mantra should be "rapid detection is the new prevention." On that, IBM begs to differ. Read More
 

New products of the week 05.05.14
Our roundup of intriguing new products from companies such as Radware and CA Read More
 

 

SLIDESHOWS

7 cool free open source projects you need to check out

The free open source world continues to expand at a phenomenal pace.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How to Become a Better Leader

2. 25 geeky Mother's Day gifts

3. IT Salaries for the 20 Hottest Tech Skills

4. Gates cedes Microsoft shareholder crown to former No. 2, Ballmer

5. 11 reasons encryption is (almost) dead

6. Unisys unveils invisibility cloak for network traffic

7. The Camera That Killed the Jeep – Part 2

8. Unplugging the data center

9. Symantec partners to fend off zero-day attacks

10. Microsoft cheaper to use than open source software, UK CIO says


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment